metasploit-framework/modules/exploits/multi
Tom Sellers 8f47edb899 JBoss_Maindeployer: improve feedback against CVE-2010-0738
The exploit against CVE-2010-0738 won't work when using GET or POST.  In the existing code the request would fail and the function would return a nil.  This would be passed to detect_platform without being checked and cause the module to crash ungracefully with the error:

Exploit failed: NoMethodError undefined method `body' for nil:NilClass

The first changes detect a 401 authentication message and provide useful feedback.  Given that if, in any case, 'res' is not a valid or useful response the second change just terminates processing.

I've stayed with the module's coding style for consistency.
2014-04-24 12:37:14 -05:00
..
browser Two more java payloads that wanted to write RHOST 2014-04-14 22:22:30 -05:00
fileformat Fix first chunk of msftidy "bad char" errors 2014-03-11 11:18:54 -05:00
ftp Saving progress 2014-01-21 17:14:55 -06:00
http JBoss_Maindeployer: improve feedback against CVE-2010-0738 2014-04-24 12:37:14 -05:00
ids Fix caps on module titles (first pass) 2013-11-15 00:03:42 -06:00
misc Saving progress 2014-01-21 13:03:36 -06:00
ntp Fix caps on module titles (first pass) 2013-11-15 00:03:42 -06:00
php Update some checks 2014-01-24 12:08:23 -06:00
realserver Saving progress 2014-01-21 13:03:36 -06:00
samba Remove EOL spaces 2013-11-20 15:08:13 -06:00
sap Update some checks 2014-01-24 12:08:23 -06:00
ssh Missing config false flag 2013-12-30 14:28:15 -06:00
svn Saving progress 2014-01-21 13:03:36 -06:00
upnp Land #2464, fixes for llmnr_response and friends 2013-12-10 13:41:45 -06:00
vnc
wyse Redo the boilerplate / splat 2013-10-15 13:51:57 -05:00
handler.rb Redo the boilerplate / splat 2013-10-15 13:51:57 -05:00